ID

VAR-200806-0184


CVE

CVE-2008-1581


TITLE

Apple QuickTime "file: URL" arbitrary code execution

Trust: 0.8

sources: CERT/CC: VU#132419

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime before 7.5 on Windows allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted packed scanlines in PixData structures in a PICT image. Apple QuickTime does not properly handle "file: URLs" which may allow an attacker to execute arbitrary code. These issues arise when the application handles specially crafted PICT image files, Indeo video content, movie files, 'file:' URIs, and AAC-encoded media. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions. Versions prior to QuickTime 7.5 are affected. An attacker can exploit this issue to execute arbitrary within the context of the affected application. Failed exploit attempts will result in a denial-of-service vulnerability. If the user is tricked into opening a malicious PICT graphics, it will cause the player to terminate or execute arbitrary instructions. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA29293 VERIFY ADVISORY: http://secunia.com/advisories/29293/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. 5) An error in the handling of "file:" URLs can be exploited to e.g. execute arbitrary programs when playing specially crafted QuickTIme content in QuickTime Player. SOLUTION: Update to version 7.5 (via Software Update or Apple Downloads. See vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: 1) Dyon Balding, Secunia Research 2) Independently discovered by: * Dave Soldera, NGS Software * Jens Alfke 3) Liam O Murchu, Symantec 4) An anonymous researcher, reported via ZDI 5) Independently discovered by: * Vinoo Thomas and Rahul Mohandas, McAfee Avert Labs * Petko D. (pdp) Petkov, GNUCITIZEN ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT1991 Secunia Research: http://secunia.com/secunia_research/2008-9/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-162C Apple Quicktime Updates for Multiple Vulnerabilities Original release date: June 10, 2008 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X running versions of QuickTime prior to 7.5 * Microsoft Windows running versions of QuickTime prior to 7.5 Overview Apple QuickTime contains multiple vulnerabilities as described in the Apple Knowledgebase article HT1991. I. Apple QuickTime 7.5 addresses these vulnerabilities. II. For further information, please see Apple knowledgebase article HT1991 about the security content of QuickTime 7.5 III. Solution Upgrade QuickTime Upgrade to QuickTime 7.5. This and other updates for Mac OS X are available via Apple Update. Secure your web browser To help mitigate these and other vulnerabilities that can be exploited via a web browser, refer to Securing Your Web Browser. IV. References * About the security content of the QuickTime 7.5 Update - <http://support.apple.com/kb/HT1991> * How to tell if Software Update for Windows is working correctly when no updates are available - <http://docs.info.apple.com/article.html?artnum=304263> * Apple - QuickTime - Download - <http://www.apple.com/quicktime/download/> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * US-CERT Vulnerability Notes for QuickTime 7.5 - <http://www.kb.cert.org/vuls/byid?searchview&query=apple_quicktime_7.5> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-162C.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-162C Feedback VU#132419" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 10, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSE7bhHIHljM+H4irAQKGtQf/bW1M/gN6V35MDqIGFK3PbaIXBqnhtFws xPl6zNdWmYVCHid6u0aZ+UYE+AESK3Qw3DdiwLRr3X9R4hoGmRUGiedv4h0owQTb Rij3K5simf2vbNBsVopFNeVnokOowkcRYUk/n0QnGn5FUnwDeKutrMwXQ94As/Y3 8z/VsKpwqjScHgedT6Hv67f8E6kSma4BBcK2NlRC9VMTWN2oUD7MDI/BSp5kcqaM TJfBJzqsWUywWRP3Bi8PYOLYbmC5Qj7nirl0lzCjJdNiS/GKUnT4LezHTlVhVOv5 FTnkO25morpDQph2+oBi6o+lCOBu6G6RtfQ7u15CGDCeZyme2B79eg== =e01A -----END PGP SIGNATURE----- . ====================================================================== 6) Time Table 10/03/2008 - Vendor notified. 13/03/2008 - Vendor response. 10/06/2008 - Public disclosure. ====================================================================== 7) Credits Discovered by Dyon Balding, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-1581 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://corporate.secunia.com/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://corporate.secunia.com/secunia_research/33/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/secunia_vacancies/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-9/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================

Trust: 3.24

sources: NVD: CVE-2008-1581 // CERT/CC: VU#132419 // JVNDB: JVNDB-2008-001435 // BID: 29619 // BID: 29649 // VULHUB: VHN-31706 // PACKETSTORM: 67149 // PACKETSTORM: 67176 // PACKETSTORM: 67152

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:lteversion:7.4.5

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.5

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.6

vendor:microsoftmodel:windows vistascope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows xpscope: - version: -

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#132419 // BID: 29619 // BID: 29649 // JVNDB: JVNDB-2008-001435 // CNNVD: CNNVD-200806-141 // NVD: CVE-2008-1581

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1581
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#132419
value: 18.25

Trust: 0.8

NVD: CVE-2008-1581
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200806-141
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31706
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1581
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31706
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#132419 // VULHUB: VHN-31706 // JVNDB: JVNDB-2008-001435 // CNNVD: CNNVD-200806-141 // NVD: CVE-2008-1581

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-31706 // JVNDB: JVNDB-2008-001435 // NVD: CVE-2008-1581

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 67176 // CNNVD: CNNVD-200806-141

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200806-141

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001435

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31706

PATCH

title:QuickTime 7.5url:http://support.apple.com/kb/HT1991

Trust: 0.8

title:QuickTime 7.5url:http://support.apple.com/kb/HT1991?locale=ja_JP

Trust: 0.8

title:TA08-162Curl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162c.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001435

EXTERNAL IDS

db:NVDid:CVE-2008-1581

Trust: 3.2

db:BIDid:29619

Trust: 2.8

db:USCERTid:TA08-162C

Trust: 2.6

db:SECUNIAid:29293

Trust: 2.6

db:SECTRACKid:1020213

Trust: 2.5

db:BIDid:29649

Trust: 2.0

db:VUPENid:ADV-2008-1776

Trust: 1.7

db:XFid:42943

Trust: 1.4

db:CERT/CCid:VU#132419

Trust: 1.1

db:USCERTid:SA08-162C

Trust: 0.8

db:JVNDBid:JVNDB-2008-001435

Trust: 0.8

db:CERT/CCid:TA08-162C

Trust: 0.6

db:APPLEid:APPLE-SA-2008-06-09

Trust: 0.6

db:BUGTRAQid:20080610 SECUNIA RESEARCH: APPLE QUICKTIME PICT IMAGE PARSING BUFFER OVERFLOW

Trust: 0.6

db:CNNVDid:CNNVD-200806-141

Trust: 0.6

db:ZDIid:ZDI-08-038

Trust: 0.3

db:ZDIid:ZDI-08-037

Trust: 0.3

db:PACKETSTORMid:67152

Trust: 0.2

db:VULHUBid:VHN-31706

Trust: 0.1

db:PACKETSTORMid:67149

Trust: 0.1

db:PACKETSTORMid:67176

Trust: 0.1

sources: CERT/CC: VU#132419 // VULHUB: VHN-31706 // BID: 29619 // BID: 29649 // JVNDB: JVNDB-2008-001435 // PACKETSTORM: 67149 // PACKETSTORM: 67176 // PACKETSTORM: 67152 // CNNVD: CNNVD-200806-141 // NVD: CVE-2008-1581

REFERENCES

url:http://secunia.com/secunia_research/2008-9/advisory/

Trust: 3.1

url:http://www.securityfocus.com/bid/29619

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-162c.html

Trust: 2.5

url:http://secunia.com/advisories/29293

Trust: 2.5

url:http://support.apple.com/kb/ht1991

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2008/jun/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/29649

Trust: 1.7

url:http://www.securitytracker.com/id?1020213

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/1776/references

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/42943

Trust: 1.4

url:http://www.securityfocus.com/archive/1/493225/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/1776/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42943

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1581

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-162c/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-162c/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1581

Trust: 0.8

url:http://securitytracker.com/alerts/2008/jun/1020213.html

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-162c.html

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.7

url:/archive/1/493225

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/493225/100/0/threaded

Trust: 0.6

url:/archive/1/493247

Trust: 0.3

url:/archive/1/493248

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/132419

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-037

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-038

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/secunia_research/2008-9/

Trust: 0.2

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/29293/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304263>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple_quicktime_7.5>

Trust: 0.1

url:http://www.apple.com/quicktime/download/>

Trust: 0.1

url:http://support.apple.com/kb/ht1991>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-162c.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://corporate.secunia.com/secunia_research/33/

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://corporate.secunia.com/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1581

Trust: 0.1

sources: CERT/CC: VU#132419 // VULHUB: VHN-31706 // BID: 29619 // BID: 29649 // JVNDB: JVNDB-2008-001435 // PACKETSTORM: 67149 // PACKETSTORM: 67176 // PACKETSTORM: 67152 // CNNVD: CNNVD-200806-141 // NVD: CVE-2008-1581

CREDITS

Dyon BaldingDave SolderaRahul Mohandas

Trust: 0.6

sources: CNNVD: CNNVD-200806-141

SOURCES

db:CERT/CCid:VU#132419
db:VULHUBid:VHN-31706
db:BIDid:29619
db:BIDid:29649
db:JVNDBid:JVNDB-2008-001435
db:PACKETSTORMid:67149
db:PACKETSTORMid:67176
db:PACKETSTORMid:67152
db:CNNVDid:CNNVD-200806-141
db:NVDid:CVE-2008-1581

LAST UPDATE DATE

2025-04-10T22:57:07.124000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#132419date:2008-06-10T00:00:00
db:VULHUBid:VHN-31706date:2018-10-11T00:00:00
db:BIDid:29619date:2008-06-11T17:22:00
db:BIDid:29649date:2008-06-11T19:12:00
db:JVNDBid:JVNDB-2008-001435date:2008-07-03T00:00:00
db:CNNVDid:CNNVD-200806-141date:2008-09-11T00:00:00
db:NVDid:CVE-2008-1581date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#132419date:2008-06-10T00:00:00
db:VULHUBid:VHN-31706date:2008-06-10T00:00:00
db:BIDid:29619date:2008-06-10T00:00:00
db:BIDid:29649date:2008-06-09T00:00:00
db:JVNDBid:JVNDB-2008-001435date:2008-07-03T00:00:00
db:PACKETSTORMid:67149date:2008-06-11T00:36:08
db:PACKETSTORMid:67176date:2008-06-11T03:00:24
db:PACKETSTORMid:67152date:2008-06-11T00:37:05
db:CNNVDid:CNNVD-200806-141date:2008-06-10T00:00:00
db:NVDid:CVE-2008-1581date:2008-06-10T18:32:00